Data is described below:
Data | Description |
---|---|
Network interface |
List of connected network interfaces. Select the injection interface connected to the network on which the device to be attacked is connected. When simulating an Access Point, the interface used in the Fake Access Point section also appears. |
Sniffing interface |
Like Network Interface or another network interface to only be used for sniffing. |
Regular expression |
Expression used to filter devices connected to the network. It is applied to all data transmitted and received by the device via network, of any kind. |
BPF network filter |
This is used to more accurately filter devices using BPF syntax (Berkeley Packet Filter). This syntax includes key words accompanied by qualifiers: |
Data is described below:
Data | Description |
---|---|
Status |
Connected network device status:
|
Filter |
![]() |
Attack |
|
HW address | Device network card hardware address. |
IP address | Device's network IP address. |
Vendor | Network card brand (rather reliable). |
Hostname | Device name. |
Data is described below:
Data | Description | ||||||||
---|---|---|---|---|---|---|---|---|---|
Wireless interface | List of non connected network interfaces. Select the interface to connect to the protected WiFi network to be opened. | ||||||||
ESSID network | Name of the local network to be opened. | ||||||||
Attack type |
Types of available password identification.
|
Data is described below:
Data | Description |
---|---|
Wireless interface |
List of non connected network interfaces. Select the interface to be displayed as the WiFi network. |
HW address | Device network card hardware address. |
Access point | Name of the Access Point expected by the device. |
RCS8.2 | User's and Installation Guide | © COPYRIGHT 2012